Page MenuHome GnuPG
Feed All Stories

Jun 10 2025

mlaurent committed rMTP897ebdb86b25: GIT_SILENT: time to increase version (authored by mlaurent).
GIT_SILENT: time to increase version
Jun 10 2025, 8:17 AM
mlaurent committed rKLEOPATRAc4b34fe90ce7: GIT_SILENT: time to increase version (authored by mlaurent).
GIT_SILENT: time to increase version
Jun 10 2025, 8:16 AM
l10n daemon script <scripty@kde.org> committed rMTP9b30530a4a24: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Jun 10 2025, 3:47 AM

Jun 9 2025

l10n daemon script <scripty@kde.org> committed rKLEOPATRAd0a370772a06: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Jun 9 2025, 5:20 AM
l10n daemon script <scripty@kde.org> committed rKLEOPATRA62e4ef79a896: GIT_SILENT Sync po/docbooks with svn (authored by l10n daemon script <scripty@kde.org>).
GIT_SILENT Sync po/docbooks with svn
Jun 9 2025, 3:44 AM

Jun 8 2025

Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPY66e8a5e43d04: build: Fix `make sdist` (authored by Paul Schwabauer <pschwabauer@intevation.de>).
build: Fix `make sdist`
Jun 8 2025, 10:53 AM

Jun 7 2025

mlaurent committed rMTP1537b0fec27a: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Jun 7 2025, 8:58 AM
mlaurent committed rKLEOPATRA56d5d77bf131: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Jun 7 2025, 8:57 AM

Jun 6 2025

Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPYc2795140e546: Fix uninstall on Debian based systems (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Fix uninstall on Debian based systems
Jun 6 2025, 9:16 PM
Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPYe4afe19f2fe3: Add missing files to uninstall target (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Add missing files to uninstall target
Jun 6 2025, 8:47 PM
mlaurent committed rKLEOPATRAd1d83c07b9dd: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Jun 6 2025, 8:06 PM
mlaurent committed rMTP5044d06338a5: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Jun 6 2025, 8:04 PM
Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPY26f99b47a7bf: Add missing files to uninstall target (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Add missing files to uninstall target
Jun 6 2025, 8:01 PM
mlaurent committed rLIBKLEOb49a14feefaf: GIT_SILENT: indent json file (authored by mlaurent).
GIT_SILENT: indent json file
Jun 6 2025, 8:00 PM
CarlSchwan committed rOJ57033608a879: Cross link doc/security with doc/communication (authored by CarlSchwan).
Cross link doc/security with doc/communication
Jun 6 2025, 1:33 PM
CarlSchwan committed rOJ27692b2a2302: Remove doc/architecture.odp (authored by CarlSchwan).
Remove doc/architecture.odp
Jun 6 2025, 1:33 PM
CarlSchwan committed rOJebf856ae5cca: Add verification dialog to confirm that native client is authorized (authored by CarlSchwan).
Add verification dialog to confirm that native client is authorized
Jun 6 2025, 1:22 PM
CarlSchwan committed rOJc2c95a95f62d: Update technical documentation (authored by CarlSchwan).
Update technical documentation
Jun 6 2025, 1:22 PM
CarlSchwan committed rOJ5bceaa34d26d: Remove serverstate and draftcontroller.h (authored by CarlSchwan).
Remove serverstate and draftcontroller.h
Jun 6 2025, 1:22 PM
gouttegd added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

Once again, thank you for your reactivity @gniibe !

Jun 6 2025, 11:00 AM · gnupg26, Bug Report
gniibe changed the status of T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token from Open to Testing.
Jun 6 2025, 7:27 AM · gnupg26, Bug Report
gniibe added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

My test coverage was not good (even if I daily use Curve25519 on Gnuk Token).
Your analysis is correct.

Jun 6 2025, 7:18 AM · gnupg26, Bug Report
gniibe committed rGfde915af1cf4: agent: Fix for the prefix 0x40 in the point representation. (authored by gniibe).
agent: Fix for the prefix 0x40 in the point representation.
Jun 6 2025, 7:16 AM
mlaurent committed rMTP55fa94a5e91d: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Jun 6 2025, 7:09 AM
gniibe triaged T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token as High priority.
Jun 6 2025, 7:00 AM · gnupg26, Bug Report
gniibe claimed T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.
Jun 6 2025, 7:00 AM · gnupg26, Bug Report
mlaurent committed rLIBKLEOdb7a895313e4: GIT_SILENT: prepare 25.04.3 (authored by mlaurent).
GIT_SILENT: prepare 25.04.3
Jun 6 2025, 6:58 AM

Jun 5 2025

philiperm added a watcher for gpa: philiperm.
Jun 5 2025, 8:45 PM
philiperm added a watcher for gnupg: philiperm.
Jun 5 2025, 8:45 PM
philiperm added a watcher for gpg4win: philiperm.
Jun 5 2025, 8:44 PM
philiperm added a watcher for kleopatra: philiperm.
Jun 5 2025, 8:17 PM
gouttegd added a project to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token: gnupg26.
Jun 5 2025, 7:49 PM · gnupg26, Bug Report
Saturneric created T7677: Duplicate --with-gnu-ld Entries in libgpg-error 1.55 configure Help Output.
Jun 5 2025, 5:22 PM · gpgrt, Bug Report
jap added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Thanks for elaborating and the reference to rfc2440 - I now understand where that stray mail (between [RFC2822] and name-addr) in rfc4880 comes from...
Anyway, I'll treat it as if it says RFC 2822 mailbox and will treat angle brackets with bare addresses as optional.

Jun 5 2025, 4:21 PM · OpenPGP, Documentation
m <meik.michalke@gnupg.com> committed rOJcc1dadac534e: Restructured doc/communication.md and added some markdown (authored by m <meik.michalke@gnupg.com>).
Restructured doc/communication.md and added some markdown
Jun 5 2025, 3:45 PM
CarlSchwan committed rOJ4a63c42a4409: Fix extracting file name from attachment (authored by CarlSchwan).
Fix extracting file name from attachment
Jun 5 2025, 3:36 PM
werner committed rOJb0cd7c3e89ff: Extend the documentation to describe the involved components (authored by werner).
Extend the documentation to describe the involved components
Jun 5 2025, 3:10 PM
ikloecker added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In Kleopatra we explicitly trigger a re-reading of the smart card after each operation involving a smart card to ensure that Kleopatra doesn't show wrong information. There's so much that can go wrong with physical smart cards that this is the only way to make sure you don't tell the user lies. I think gpg --edit-card also re-reads the smart card after each operation.

Jun 5 2025, 2:57 PM · gnupg26, gnupg, Bug Report
ikloecker removed a project from T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated): gpgme.

There is no bug in the contexts and there's nothing to document anywhere. If anything then it's a bug in gpg's generate command or a more general issue (in gpg-agent) with keeping track of the storage location of private keys as I have already explained in T7620#200613. I'm removing the gpgme tag because there's nothing wrong in gpgme and there's nothing we can do in gpgme. It needs to be addressed in gnupg.

Jun 5 2025, 2:45 PM · gnupg26, gnupg, Bug Report
CarlSchwan committed rOJ582cfed2cfc4: Add documentation for the communication (authored by CarlSchwan).
Add documentation for the communication
Jun 5 2025, 2:29 PM
CarlSchwan committed rOJ1673c9c12c49: Reuse sendMessageToNative/WebClient (authored by CarlSchwan).
Reuse sendMessageToNative/WebClient
Jun 5 2025, 2:29 PM
CarlSchwan committed rOJ598b4a37c861: web: Use generic action also to open composer (authored by CarlSchwan).
web: Use generic action also to open composer
Jun 5 2025, 2:29 PM
CarlSchwan committed rOJeedaae5aae97: Update security doc (authored by CarlSchwan).
Update security doc
Jun 5 2025, 2:29 PM
CarlSchwan committed rOJc9c41a472198: Forward message to client then there is only one available (authored by CarlSchwan).
Forward message to client then there is only one available
Jun 5 2025, 1:20 PM
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

In practice, calling gpgme_get_key() will often pick up most changes because GPGME asks the underlying GPG agent daemon, which may re-read the keyring. That gives the impression that a long-lived context automatically reflects live updates. However, as aheinecke noted, some updates can still go unnoticed in a single gpgme_ctx_t, so it isn’t a strictly frozen snapshot nor a perfectly live view—behaviors are mixed.

Jun 5 2025, 12:33 PM · gnupg26, gnupg, Bug Report
Saturneric added a comment to T7620: gpgme_get_key fails to detect secret encryption subkey after key generation on card (until context is recreated).

Maybe we should make the documentation clearer about context key reuse. But the context is specifically designed to cache information about a key, so as to avoid memory overhead. I learned early on that its best for each new operation to use a new context. A context is basically an instance of gpg or gpgsm. So you start one process, ask it for a keylist, keep the process running, start another process, modify the key database, and then ask the first process again about his worldview. Either the first process is a bit confused because it has read data and then that data changed (what happens here) or it has no idea about the change since it was efficient and only read the database once. But here in this example you should be able to reproduce this also by making any other modifications to the key, adding other subkeys, userids etc. That GPGME even notices the secret key is more of a side effect of how the programming works because the GPGME gpg process will ask the gpg-agent (so a third process).

Jun 5 2025, 12:14 PM · gnupg26, gnupg, Bug Report
Saturneric added a comment to T7673: Release GPGME 2.0.0.

We will keep the 1.24 branch for bug fixing. Do you really have a problem with gpgme 2.0? Ist that due to factoring out the c++ and qt bindings? That was actually a long standing request from the KDE community so that they can use their cmake stuff.

Jun 5 2025, 11:50 AM · Release Info, gpgme
werner added a comment to T7673: Release GPGME 2.0.0.

We will keep the 1.24 branch for bug fixing. Do you really have a problem with gpgme 2.0? Ist that due to factoring out the c++ and qt bindings? That was actually a long standing request from the KDE community so that they can use their cmake stuff.

Jun 5 2025, 11:37 AM · Release Info, gpgme
werner committed rWb9587aa45a8a: Again update gpgoljs (authored by werner).
Again update gpgoljs
Jun 5 2025, 11:21 AM
werner committed rD16150a3d07dd: Rename the legacy gnupgdesk to gpd and add a vsd entry (authored by werner).
Rename the legacy gnupgdesk to gpd and add a vsd entry
Jun 5 2025, 10:43 AM
werner added a comment to T7656: Kleopatra: Wrong update suggestion from 5.0.0 to 4.4.0.

I updated the version database. We now have entries for "gpg4win", "gpd", and "vsd"

Jun 5 2025, 10:43 AM · Bug Report, gpd5x, kleopatra
Saturneric added a comment to T7673: Release GPGME 2.0.0.

I'm wondering whether gpgme v1 will still be supported? Or it will be abandoned from now on.

Jun 5 2025, 10:37 AM · Release Info, gpgme
werner closed T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address as Resolved.

I see, I had rfc2440 in mind which says:

By convention, it includes  an RFC 822 mail name, but there are no restrictions on its content.

thus 4880 refined it a bit. But in practice it is not the same because it is utf8 and not punycode or whatever. let's close this bug because they way it is used will work with all mail clients.

Jun 5 2025, 10:17 AM · OpenPGP, Documentation
werner committed rWecb08a109cdb: download.sh: Print the actually downloaded files. (authored by werner).
download.sh: Print the actually downloaded files.
Jun 5 2025, 10:10 AM
ikloecker added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Let's have a look at the section of RFC4880 linked by the reporter:

A User ID packet consists of UTF-8 text that is intended to represent
the name and email address of the key holder.  By convention, it
includes an RFC 2822 [RFC2822] mail name-addr, but there are no
restrictions on its content.  [...]
Jun 5 2025, 10:09 AM · OpenPGP, Documentation
werner added a comment to T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.

Let's have a look at the spec (rfc2822 3.4):

address         =       mailbox / group
Jun 5 2025, 9:38 AM · OpenPGP, Documentation
gniibe added a comment to rGeb7d5d4d8507: scd: Fix detecting digest OID in the message to be signed..

OK, fixed in rG27e6622322b5: scd: Take care of possible buffer overflow in do_auth.

Jun 5 2025, 3:25 AM
gniibe committed rG27e6622322b5: scd: Take care of possible buffer overflow in do_auth. (authored by gniibe).
scd: Take care of possible buffer overflow in do_auth.
Jun 5 2025, 3:25 AM
gniibe added a comment to T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard.

The problem was: In scdaemon, PKSIGN with OPENPGP.3 didn't work well for Ed25519 (done by do_auth function in app-openpgp.c), when --hash=sha512 (not SHA1).

Jun 5 2025, 2:52 AM · gnupg, ssh, Bug Report
gouttegd added a comment to T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.

So I’ve played a bit with agent/pkdecrypt.c. I don’t claim to understand everything that is going on there, but:

Jun 5 2025, 1:53 AM · gnupg26, Bug Report

Jun 4 2025

Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPY2711b5e7a918: Move file copy to `copystamp` target (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Move file copy to `copystamp` target
Jun 4 2025, 5:51 PM
CarlSchwan committed rOJ1b5452646b02: server: Only connect to localhost also when using Qt < 6.8 (authored by CarlSchwan).
server: Only connect to localhost also when using Qt < 6.8
Jun 4 2025, 5:02 PM
CarlSchwan committed rOJae18eae0c29a: Don't use Kleo::KeyCache to load user own keys (authored by CarlSchwan).
Don't use Kleo::KeyCache to load user own keys
Jun 4 2025, 4:56 PM
CarlSchwan committed rOJc5b55a742f6d: server: Fix sending error to web client (authored by CarlSchwan).
server: Fix sending error to web client
Jun 4 2025, 4:56 PM
m <meik.michalke@gnupg.com> committed rOJ13ca3a1a9089: updated README.md (authored by m <meik.michalke@gnupg.com>).
updated README.md
Jun 4 2025, 4:54 PM
CarlSchwan committed rW265cad1d1d0d: Bump gpgoljs package (authored by CarlSchwan).
Bump gpgoljs package
Jun 4 2025, 4:10 PM
CarlSchwan committed rOJcb2b3ba956ba: Don't install web assets in sub-directory dist (authored by CarlSchwan).
Don't install web assets in sub-directory dist
Jun 4 2025, 3:59 PM
Paul Schwabauer <pschwabauer@intevation.de> committed rGPGMEPYb975b846cfde: Only copy necessary files and add them to the clean list (authored by Paul Schwabauer <pschwabauer@intevation.de>).
Only copy necessary files and add them to the clean list
Jun 4 2025, 3:40 PM
svuorela committed rKLEOPATRA25087a04419e: Dbus-by-default off on windows and similar (authored by svuorela).
Dbus-by-default off on windows and similar
Jun 4 2025, 3:18 PM
svuorela committed rKLEOPATRAc27e2725698e: KWatchGnupg build: use dbus link variable (authored by svuorela).
KWatchGnupg build: use dbus link variable
Jun 4 2025, 2:49 PM
werner committed rW16fa1b772b2e: Also update gpg4win-tools and add patch to the Makiefile (authored by werner).
Also update gpg4win-tools and add patch to the Makiefile
Jun 4 2025, 2:48 PM
CarlSchwan committed rKLEOPATRA74fc903a7357: Dbus-by-default off on windows and similar (authored by svuorela).
Dbus-by-default off on windows and similar
Jun 4 2025, 2:45 PM
svuorela committed rKLEOPATRA3d940a3c44b2: Link autotests on windows; The uniqueservice stuff needs kf6i18n and… (authored by svuorela).
Link autotests on windows; The uniqueservice stuff needs kf6i18n and…
Jun 4 2025, 2:40 PM
CarlSchwan committed rWbc293d082c14: Bump gpgoljs snapshot (authored by CarlSchwan).
Bump gpgoljs snapshot
Jun 4 2025, 2:24 PM
CarlSchwan committed rOJ39f8a59b3d9e: Remove duplicated icon (authored by CarlSchwan).
Remove duplicated icon
Jun 4 2025, 2:21 PM
gouttegd created T7676: Cannot decrypt a message encrypted to a Cv25519 key on a token.
Jun 4 2025, 2:03 PM · gnupg26, Bug Report
CarlSchwan committed rOJ607f0adaabc1: Install icons with ecm_install_icons (authored by CarlSchwan).
Install icons with ecm_install_icons
Jun 4 2025, 1:56 PM
svuorela committed rKLEOPATRAdd4279419a95: Fix some build-parts with msvc (authored by svuorela).
Fix some build-parts with msvc
Jun 4 2025, 1:50 PM
jap created T7675: a user-id with just an email address (and not a display name) has no angle brackets surrounding the email address.
Jun 4 2025, 1:42 PM · OpenPGP, Documentation
sj98ta added a comment to T7660: GPGME invocation by cri-o hangs on gpgme_op_verify.

No other processes that I have seen. However please see this last update by Kulbarsch. https://github.com/cri-o/cri-o/issues/8906#issuecomment-2936351035

Jun 4 2025, 12:55 PM · golang, gpgme, Bug Report
CarlSchwan committed rKLEOPATRAb6552ab0a009: flatpak: bump ktextaddons version (authored by CarlSchwan).
flatpak: bump ktextaddons version
Jun 4 2025, 11:56 AM
ikloecker committed rWda88912ca159: Add patch for gpgol 2.6.1 (authored by ikloecker).
Add patch for gpgol 2.6.1
Jun 4 2025, 11:48 AM
CarlSchwan committed rKLEOPATRAd2abc97e1904: flatpak: Update gpgme to 2.0.0 release (authored by CarlSchwan).
flatpak: Update gpgme to 2.0.0 release
Jun 4 2025, 11:48 AM
svuorela committed rKLEOPATRA2cca42ccb582: KWatchGnupg build: use dbus link variable (authored by svuorela).
KWatchGnupg build: use dbus link variable
Jun 4 2025, 11:05 AM
svuorela committed rKLEOPATRA9116f186aa96: Dbus-by-default off on windows and similar (authored by svuorela).
Dbus-by-default off on windows and similar
Jun 4 2025, 11:03 AM
svuorela committed rKLEOPATRA92db78a86121: Link autotests on windows; The uniqueservice stuff needs kf6i18n and… (authored by svuorela).
Link autotests on windows; The uniqueservice stuff needs kf6i18n and…
Jun 4 2025, 11:02 AM
CarlSchwan committed rOJ94275b1bab5e: Fix unique window on Windows (authored by CarlSchwan).
Fix unique window on Windows
Jun 4 2025, 10:43 AM
CarlSchwan committed rOJ91b8f25d91c2: Add qrc for icons (authored by CarlSchwan).
Add qrc for icons
Jun 4 2025, 10:43 AM
werner added a comment to rGeb7d5d4d8507: scd: Fix detecting digest OID in the message to be signed..

We should also add a check that INDATALEN is > 15 to make the function robust against bad args.

Jun 4 2025, 10:22 AM
TobiasFella updated the task description for T7674: Kleopatra: Restore behavior of RSAKeySizes and PGPKeyType.
Jun 4 2025, 10:15 AM · vsd33 (vsd-3.3.3), kleopatra
werner committed rWdaa38eb6cfe4: The regular gpgme tarball is bz2 compressed. (authored by werner).
The regular gpgme tarball is bz2 compressed.
Jun 4 2025, 9:45 AM
werner committed rW17648f8e546f: Update Kleopatra and gpgoljs (authored by werner).
Update Kleopatra and gpgoljs
Jun 4 2025, 9:42 AM
ikloecker committed rMca6419d5ec4d: NEWS: Mention the split of gpgme (authored by ikloecker).
NEWS: Mention the split of gpgme
Jun 4 2025, 9:13 AM
werner committed rW5df06db16952: po: Update gpg4win.pot (authored by werner).
po: Update gpg4win.pot
Jun 4 2025, 8:54 AM
werner committed rW38c41bf6da4f: po: Update all po files for the translators. (authored by werner).
po: Update all po files for the translators.
Jun 4 2025, 8:54 AM
gniibe committed rGeb7d5d4d8507: scd: Fix detecting digest OID in the message to be signed. (authored by gniibe).
scd: Fix detecting digest OID in the message to be signed.
Jun 4 2025, 6:58 AM
gniibe changed the status of T7589: Unable to export SSH keys for ED25519 keys generate on a SmartCard from Open to Testing.

I located the bug in scdaemon.

Jun 4 2025, 6:58 AM · gnupg, ssh, Bug Report
gniibe added a comment to T7660: GPGME invocation by cri-o hangs on gpgme_op_verify.

@sj98ta
Does cri-o invokes processes (other than the ones of gpgme) by its threads?

Jun 4 2025, 2:07 AM · golang, gpgme, Bug Report

Jun 3 2025

werner committed rW4f32dce409a7: Update gpgme, gpgmepp, and qgpgme to 2.0.0 (authored by werner).
Update gpgme, gpgmepp, and qgpgme to 2.0.0
Jun 3 2025, 6:20 PM
ikloecker committed rGPGMEQT71f68de65b90: build: Fix logic for CONFIGURE_FOR_DISTRIBUTION (authored by ikloecker).
build: Fix logic for CONFIGURE_FOR_DISTRIBUTION
Jun 3 2025, 6:12 PM